Solved

proxy chaining

Posted on 2006-11-17
5
294 Views
Last Modified: 2010-04-11
On my network i have 2 proxy servers setup. At the moment there are 2 setup because we are having some connectivity problems with each of the proxies. With both together all connectivity would be fine. So basically this chain would just be a temperary fix if its possible.

My question is this: Is it possible to chain proxies on IE6?

I have read that this syntax might work: proxy02.app.test.domain.com:80 proxy1.domain.com [80]


After entering this information in IE6 and doing a netstat is looks like both are being used

here is my netstat result:

Active Connections

  Proto  Local Address          Foreign Address        State
  TCP    nypc:10866       proxy02.app.test.domain.com:http
ESTABLISHED
  TCP    nypc:16280       proxy1.domain.com:http  CLOSE_WAIT
  TCP    nypc:21399       proxy1.domain.com:1081  ESTABLISHED
  TCP    nypc:25424       proxy1.domain.com:http  CLOSE_WAIT
  TCP    nypc:28786       proxy02.app.test.domain.com:http
ESTABLISHED
  TCP    nypc:29130       proxy1.domain.com:http  CLOSE_WAIT
  TCP    nypc:29131       proxy1.domain.com:http  CLOSE_WAIT
  TCP    nypc-29518       171.218:24.66:1494   ESTABLISHED
  TCP    nypc:30162       proxy02.app.test.domain.com:http
CLOSE_WAIT
  TCP    nypc:30294       proxy02.app.test.domain.com:http
CLOSE_WAIT
  TCP    nypc:30708       proxy02.app.test.domain.com:http
ESTABLISHED
  TCP    nypc:30709       dc01.domain.test.domain.com:epmap  TIME
_WAIT
  TCP    nypc:30710       dc01.domain.test.domain.com:1026  TIME_
WAIT
  TCP    nypc:30722       proxy02.app.test.domain.com:15871
 TIME_WAIT
  TCP    nypc:30723       proxy02.app.test.domain.com:15871
 TIME_WAIT
  TCP    nypc:57299       proxy02.app.test.domain.com:http
CLOSE_WAIT


Does this mean that both proxies are being used?
0
Comment
Question by:alexr54
  • 2
  • 2
5 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 17972187
do you mean chaning proxies, or do you mean to use fallbacks?
0
 
LVL 2

Author Comment

by:alexr54
ID: 17973494
yes
0
 
LVL 2

Author Comment

by:alexr54
ID: 17973775
Sorry about the last short answer. Didnt have much time on my hands.

I'm looking for a fallback solution. Im not even sure if that is possible. But worth asking though.
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 500 total points
ID: 17973947
AFAIK it's not possiblewith IE
You need a proxy which itself can detect if the next hop is alive and switch to another one if not.
Sorry, don't know of any, orat least how to configure it.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Customized VNC 1 36
What does GoogleTagMgr javascripts below do 5 29
Public Printing Options 3 46
Can not open an anonymous level security token 2 44
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question